Digital Evidence Bag Selection for P2P Network Investigation Mark Scanlon and Tahar Kechadi School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4, Ireland. {mark.scanlon,tahar.kechadi}@ucd.ie http://csi.ucd.ie

Abstract. The collection and handling of court admissible evidence is a fundamental component of any digital forensic investigation. While the procedures for handling digital evidence take much of their influence from the established policies for the collection of physical evidence, due to the obvious di↵erences in dealing with non-physical evidence, a number of extra policies and procedures are required. This paper compares and contrasts some of the existing digital evidence formats or “bags” and analyses them for their compatibility with evidence gathered from a network source. A new digital extended evidence bag is proposed to specifically deal with evidence gathered from P2P networks, incorporating the network byte stream and on-the-fly metadata generation to aid in expedited identification and analysis. Keywords: Peer-to-Peer, Network, Digital Forensics, Evidence Handling

1

Introduction

Selecting an evidence storage format for any digital investigation can be an important decision with respect to the efficiency of the entire investigation. The are numerous choices of digital evidence bags (DEBs) available with varying levels of inter-compatibility and performance benefits. Most of the existing DEBs are focused on the storage of images from physical digital storage media, e.g., hard drives, memory cards, etc. However, with respect to network focused investigations, many of the existing procedures and tools merely o↵er a method for capturing the network traffic in a “raw” format. The analysis stage of the investigation is generally limited to start after the completion of the network recording/sniffing process. In a non-time-sensitive network investigation, this limitation might have a minor impact on the desired evidence collection. However, in a time-sensitive, high traffic network, this limitation could result in the analysis, and possible reaction/mitigation phase of the network investigation commencing too late, e.g., in a high packet frequency P2P network such as a P2P botnet. Due to the high churn rates typical of most P2P networks, the time

2

Mark Scanlon, Tahar Kechadi

required from the recording of P2P network traffic to identifying the traffic and extracting any useful evidence is paramount. When attempting to reverse engineer a newly discovered P2P network, the job is left in the hands of the digital investigator. It is his responsibility to attempt to match common packet patterns and deduce based on the gathered evidence the protocol of the network. This paper outlines the case for a P2P network specific DEB which is capable of storing the captured packets alongside some useful metadata to aid the investigator in this process.

2

Evidence Handling

When dealing with physical forensic evidence, the commonly used handling procedure is the “chain of custody” [1]. The chain of custody commences at the crime scene where the evidence is collected, when the investigating officer collects any evidence he finds and places it into an evidence bag. This evidence bag will be sealed to avoid any contamination from external sources and signed by the officer and will detail some facts about the evidence, e.g., description of evidence, location it was found, date and time found, etc. The chain of custody will then be updated again when the evidence is checked into the evidence store in the forensic laboratory. When it comes to analysing the evidence, it will be checked out to the forensic analyst’s custody and any modification to the evidence required to facilitate the investigation, e.g., taking a sample from a collected fibre to determine its origin or identification, etc., will be logged and documented. The procedures outlined above for physical evidence need to be extended for digital evidence acquisition and analysis. Due to the fact that digital evidence is generally analysed on forensic workstations, most of the above sequences can be automated into concise logging of all interactions. During a digital investigation, there is no requirement to modify the existing evidence in any way. This is because all analysis is conducted on an image of the original source and any discovered evidence can be extracted from this image, documented and stored separately to both the original source and the copied image. It is imperative when dealing with all types of evidence that all procedures used are reliable, reproducible and verifiable. In order for evidence to be court admissible, it must pass the legal criteria for the locality that the court case is being heard, as outlined in greater detail in section 4 below. 2.1

What does “Forensically Sound” really mean?

Many of the specifications for digital forensic acquisition tools, analysis tools, storage formats and hash functions state that the product in question is “forensically sound” or that the product works with the digital evidence in a “forensically sound manner”, without specifying exactly what the term means. In 2007, E. Casey published a paper in the Digital Investigation Journal entitled “What does “forensically sound” really mean ?” [2].

Digital Evidence Bag Selection for P2P Network Investigation

3

In this paper, Casey outlines some of the common views of forensic professionals regarding dealing with digital forensic evidence. Purists state that any digital forensic tools should not alter the original evidence in any way. Others point out that the act of preserving certain types of evidence necessarily alters the original, e.g., a live memory evidence acquisition tool must be loaded into memory (altering the state of the volatile memory and possibly overwriting some latent evidence) in order to run the tool and capture any evidence contained in the memory. Casey then goes onto to explain how some traditional forensic process require the altering of some of the evidence in order to collect the required information. For example, collecting DNA evidence requires taking a sample from some collected evidence, e.g., a hair. Subsequently, the forensic analysis of this evidentiary sample (DNA profiling) is destructive in its nature which further alters the original evidence. 2.2

Splitting Evidence

It is not always possible to store the entire image of a particular storage device or sequence of network packets in one large file. This could be for a number of reasons, such as the evidence being stored on a FAT32 formatted hard drive which is only capable of addressing a file less than 232 bytes (4,294,967,296 bytes or 4 gigabytes) or if evidence needs to be backed up to external media, e.g., a data CD or DVD, capable of storing 700MB and 4.7GB respectively. If the acquired evidence is going to be transmitted over the Internet, it should be a capability of any digital evidence bag to split the evidence into smaller parts to minimise the cost of dropped connections. The CDESF working group conducted a survey in 2006 and found that each of the evidence storage formats they tested was capable of allowing split archiving and storage of evidence [3]. Should any tool split the evidence during acquisition, for transmission or storage purposes, this collected evidence should be recompilable into the original source for examination purposes. To ensure forensic integrity, the tools used for splitting and recompiling the evidence should be able to verify the recompiled image against the original untouched source using a sufficiently collision resistant hash values.

3

Evidence Storage Formats

There is currently no universal standard for the format that digital evidence and any case related information is stored. This is due to the fact that there are no state or international governmental policies to outline a universal format. Many of the vendors developing forensic tools have developed their own proprietary format. With such a relatively small target market, it sometimes makes business sense for them to try and lock their customers into buying only their software in the future. There have been a small number of attempts at creating open formats to store evidence and any related metadata. This section describes the most common of these formats below.

4

3.1

Mark Scanlon, Tahar Kechadi

Common Digital Evidence Storage Format

The Common Digital Evidence Storage Format (CDESF) Working Group was created as part of the Digital Forensic Research Workshop (DRFWS) in 2006. The goal of this group was to create an open data format for storing digital forensic evidence and associated metadata from multiple sources, e.g., computer hard drives, mobile Internet devices, etc. [4]. The format which the CDESF working group were attempting to create would have specified metadata capable of storing case-specific information such as case number, digital photographs of any physical evidence collected and the name of the digital investigator conducting the investigation. In 2006, the working group produced a paper outlining the advantages and disadvantages of various evidence storage formats [3]. Ultimately due to resource restrictions, the CDESF working group was disbanded in 2007 before accomplishing their initial goal. 3.2

Raw Format

According to the CDESF Working Group, “the current de facto standard for storing information copied from a disk drive or memory stick is the so-called “raw” format: a sector-by-sector copy of the data on the device to a file” [5]. The raw format is so-called due to the fact that it is simply a file containing the exact sector-by-sector copy of the original evidence, e.g., files, hard disk/flash memory sectors, network packets, etc. Raw files are not compressed in any manner and as a result, any deleted or partially overwritten evidence that may lay in the slackspace of a hard disk is maintained. All of the commercial and open source digital evidence capturing tools available have the capability of creating raw files. 3.3

Advanced Forensic Format

The Advanced Forensic Format (AAF) is an open source, extensible format created by S. Garfinkel in Basis Technology in 2006 [6]. The AAF format has a major emphasis on efficiency and as a result is partitioned into two layers; the disk representation layer which defines segment name used for storing all data associated with an image and the data storage layer which defines how the image is stored, be it binary or XML[7]. The format specifies three variants; AFF, AFD and AFM. AFF stores all data and metadata in a single file, AFD stores the data and metadata in multiple small files, and AFM stores the data in a raw format and the metadata is stored in a separate file [7]. 3.4

Generic Forensic Zip

Generic Forensic Zip (gfzip) is an open source project to create a forensically sound compressed digital evidence format based on AAF 3.3 [8]. Due to the fact that it is based upon the AAF format, there is limited compatibility between the two in terms of segment based layout. One key advantage that gfzip has over the AAF format is that gfzip seeks to maintain compatibility with the raw format 3.2. It achieves this by allowing the raw data to be placed first in the compressed image [7].

Digital Evidence Bag Selection for P2P Network Investigation

3.5

5

Digital Evidence Bag (QinetiQ)

The method for traditional evidence acquisition involves a law enforcement officer collecting any relevant items at the crime scene and storing the evidence in bags and seals. These evidence bags may then be tagged with any relevant case specific information, such as [1]: – – – – – – – – – – –

Investigating Agency / Police Force Exhibit reference number Property reference number Case/Suspect name Brief description of the item Date and time the item was seized/produced Location of where the item was seized/produced Name of the person that is producing the item as evidence Signature of the person that is producing the item Incident/Crime reference number Laboratory reference number

Digital Evidence Bag (DEB) is a digital version of the traditional evidence bag, created by Philip Turner in 2005 [1]. DEB is based on an adaptation of existing storage formats, with potentially infinite capacity. The data stored in a DEB is stored in multiple files, along with metadata containing the information that would traditionally be written on the outside of an evidence bag. There are currently no tools released that are compatible with the DEB format. 3.6

Digital Evidence Bag (WetStone Technologies)

In 2006, C. Hosmer, from WetStone Technologies Inc., published a paper outlining the design of a Digital Evidence Bag (DEB) format for storing digital evidence [9]. This format for storing is independent from the Digital Evidence Bag outlined in 3.5. The format emerged from a research project funded by the U.S. Air Force Research Laboratory. The motivation for this format was similar to the motivation for that described in 3.5, i.e., to metaphorically mimic the plastic evidence bag used by crime scene investigators to collect physical evidence such as blood, fibres, hairs etc. This format will be released publicly when complete. 3.7

EnCase Format

The EnCase format for storing digital forensic is proprietary to the evidence analysis tool of the same name. It is by far the most common evidence storage option used by law enforcement and private digital investigation companies for the acquisition of digital evidence from physical storage media [7]. Because of the proprietary nature of the format, along with the lack of any formal specification from Guidance Software [10], much remains unknown about the format itself. Some competitors to Guidance Software have attempted to reverse engineer the

6

Mark Scanlon, Tahar Kechadi

format to provide an element of cross-compatibility with their tools [6]. EnCase stores a disk image as a series of unique compressed pages. Each page can be individually retrieved and decompressed in the investigative computer’s memory as needed, allowing a somewhat random access to the contents of the image file. The EnCase format also has the ability to store metadata such as a case number and an investigator [6].

4

Court Admissible Evidence

Since the United States leads the way with the implementation of many standards in relation to evidence handling and the court admissibility of evidence, many other countries look to the procedures outlined by the United States in this area when attempting to create their own legal procedures [11]. As a result of this, much of the information available regarding the admissibility of digital forensic evidence into court cases is specifically tailored to the Unites States, but will influence law makers across the globe. Carrier [12] states that in order for evidence to be admissible into a United States legal proceeding, the scientific evidence (a category which digital forensic evidence falls under in the U.S.) must pass the so-called “Daubert Test” (as outlined below). The reliability of the evidence is determined by the judge in a pre-trail “Daubert Hearing”. The judge’s responsibility in the Daubert Hearing is to determine whether the methodologies and techniques used to identify the evidence was sound, and as a result, whether the evidence is reliable. 4.1

Daubert Test

The “Daubert Test” stems from the United States Supreme Court’s ruling in the case of Daubert vs. Merrell Dow Pharmaceuticals (1993) [13]. The Daubert process outlines four general categories that are used as guidelines by the judge when assessing the procedure(s) followed when handling the evidence during the acquisition, analysis and reporting phases of the investigation, [12] and [13]: 1. Testing – Can and has the procedure been tested? Testing of any procedure should include testing of the number of false negatives, e.g., if the tool displays filenames in a given directory, then all file names must be shown. It should also incorporate testing of the number of false positives, e.g. if the tool was designed to capture digital evidence, and it reports that it was successful, then all forensic evidence must be exactly copied to the destination. The U.S. National Institute of Standards and Technology (NIST) have a dedicated group working on Computer Forensic Tool Testing (CFTT) [14]. 2. Error Rate – Is there a known error rate of the procedure? For example, accessing data on a disk formatted in a documented file format, e.g., FAT32 or ext2, should have a very low error rate, with the only errors involved being programming errors on behalf of the developer. Acquiring evidence from an officially undocumented file format, e.g., NTFS, may result in unknown file access errors occurring, in addition to the potential programming error rate.

Digital Evidence Bag Selection for P2P Network Investigation

7

3. Publication – Has the procedure been published and subject to peer review? The main condition for evidence admission under the predecessor to the Daubert Test, the Frye Test, was that the procedure was documented in a public place and undergone a peer review process. This condition has been maintained in the Daubert Test [12]. In the area of digital forensics, there is only one major peer-reviewed journal, the International Journal of Digital Evidence. 4. Acceptance – Is the procedure generally accepted in the relevant scientific community? For this guideline to be assessed, published guidelines are required. Closed source tools have claimed their acceptance by citing the large number of users they have. The developers of these tools do not cite how many of their users are from the scientific community, or how many have the ability to scientifically assess the tool. However, having a tool with a large user base can only prove acceptance of the tool; it cannot prove the acceptance of the undocumented procedure followed when using the tool.

5

Legal Considerations of Network Forensics

Collecting network traffic can pose legal issues. Deploying a packet sniffing or deep packet inspection device, such as those outlined above, can result in the (intentional or incidental) capture of information with privacy and security implications, such as passwords or e-mail content, etc. As privacy has become a greater concern for computer users and organisations, many have become less willing to cooperate or share any information. For example, most ISPs will now require a court order before providing any information related to suspicious activity on their network [15]. In Europe, continental legal systems operate on the principle of free introduction and free evaluation of evidence and provide that all means of evidence, irrespective of the form they assume, can be admitted into legal proceedings [16]. 5.1

Jurisdiction

One aspect of the use of search and seizure warrants in an Internet environment concerns the geographical scope of the warrant issued by a judge or a court authorising the access to the digital data. In the past, the use of computergenerated evidence in court has posed legal difficulties in common law countries, and especially in Australia, Canada, the United Kingdom and the USA. The countries are characterised by an oral and adversarial procedure. Knowledge from secondary sources is regarded as “hearsay evidence”, such as other persons, books, records, etc., and in principle is inadmissible. However, digital evidence has become widely admissible due to several exceptions to this hearsay rule [16].

6

Conclusion

While a number of the digital evidence bags outlined above are capable of storing captured network streams, the DEB itself o↵ers little additional useful features

8

Mark Scanlon, Tahar Kechadi

with respect to the investigation of P2P networks. As a result, a new P2P DEB is proposed capable of aiding in the identification and investigation of these networks. This P2P DEB is capable of storing network traffic, alongside specific P2P network metadata, based on on-the-fly analysis during the network capturing process. Building upon existing network packet recording tools, such as libpcap [17], a additional packet analysis tool can identify known P2P packets as well as record the categorisation and frequency of each type of captured packet. This additional metadata will aid in the identification of new, undiscovered P2P networks.

References 1. Turner, P.: Unification of digital evidence from disparate sources (digital evidence bags). Digital Investigation 2(3) (2005) 223–228 2. Casey, E.: What does forensically sound really mean. Digital Investigation 4(2) (2007) 49–50 3. (CDESF), C.D.E.S.F.: Survey of existing disk image storage formats. In: Proc. Digital Forensic Research Workshop 2006. (September 2006) 4. Group, D.F.R.W.D.C.D.E.S.F.C.W.: http://www.dfrws.org/CDESF/index.shtml. (September 2006) 5. Group, T.C.D.E.S.F.W.: Standardizing digital evidence storage. Communications of the ACM 49(2) (2006) 67–68 6. Richard, G., Roussev, V., Marziale, L.: Forensic discovery auditing of digital evidence containers. Digital Investigation 4(2) (2007) 88–97 7. Zip, G.F.: http://www.nongnu.org/gfzip/. (April 2009) 8. Hosmer, C.: Digital evidence bag. Commun. ACM 49(2) (2006) 69–70 9. Features, E.F.: http://www.guidancesoftware.com/WorkArea/ DownloadAsset.aspx?id=671. Guidance Software (August 2009) 10. Science, Comittee, T.: Forensic science on trial. (2005) 75–76 11. Carrier, B.: Open source digital forensics tools: The legal argument. @stake Research Report (2002) 12. Supreme Court of the United States, D.v.M.D.P.S.: http://supct.law.cornell.edu/supct/html/92-102.ZS.html/. (June 1993) 13. Computer Forensic Tool Testing program, U.S.N.I.o.S., Technology: http://www.cftt.nist.gov/. (August 2009) 14. of Standards, N.I., Technologyl: NIST Special Publication 800-86 Guide to Integrating Forensic Techniques Into Incident Response. CreateSpace, Paramount, CA (2012) 15. Karyda, M., Mitrou, L.: Internet forensics: Legal and technical issues. In: Digital Forensics and Incident Analysis, 2007. WDFIA 2007. Second International Workshop on, IEEE (2007) 3–12 16. McCanne, S., Leres, C., Jacobson, V.: Libpcap (June 2012)

Digital Evidence Bag Selection for P2P network investigation.pdf ...

Due to the high churn rates typical of most P2P networks, the time. Page 1 of 8 .... Displaying Digital Evidence Bag Selection for P2P network investigation.pdf.

218KB Sizes 1 Downloads 193 Views

Recommend Documents

Database Selection and Result Merging in P2P Web Search
document ranking measures, to address the specific issues of P2P Web search. ..... Conference on Research and Development in Information Retrieval ACM SIGIR '99, .... ference on Database Systems for Advanced Applications DASFAA '97, ...

TreeP: A Tree Based P2P Network Architecture
This network architecture is called TreeP (Tree based P2P network architecture) and is based on a ..... Each peer maintains its routing table by exchanging data through its active connections. ..... Middleware Fabric for Grid-based Remote Visualizati

Cycloid: A constant degree P2P network architecture Team ... - RIT CS
Cycloid: A constant degree P2P network architecture. Team: Comfortably Dumb. Report 3 ... d . ○ Avg. number of hops, H = A + Cd where A and C are constants ...

A Multilayer Topic-Group based P2P Network
managed distribution is more efficient and reliable than the mass and .... operator) the summaries in the Local Peers or ones in the low layer of Delegate Peers.

A Scalable and Robust Structured P2P Network Based ...
placement of data, and thus exhibit several unique properties that unstructured P2P ... D. Guo and Y. Liu are with the Department of Computer Science and. Engineering, Hong ...... and is sometimes less than d but becomes d after a recovery period in

Network Structures from Selection Principles
We present an analysis of the topologies of a class of networks which are optimal in terms of the requirements .... distribution. Data are averaged over 200 realizations for .... 1:05, n 100. The graphs have been produced with the Pajek software.

Evidence gathering for network security and forensics - dfrws
a mechanism to check if some of the detected anomalies are correlated ... In this work, we ... in CDN (Content Delivery Network) caches (Fiadino et al., 2014),.

Network Structures from Selection Principles
3The Abdus Salam International Center for Theoretical Physics, 34014 Trieste, Italy. 4Centro ... network. Scale-free networks arising from optimal design have been previously studied [16]. .... Data are averaged over 200 realizations for.

Striking Evidence from the London Underground Network
May 16, 2017 - 3 The strike. On January 10, 2014, the Rail Maritime Transport union, the largest trade union in the British transport sector, announced a 48-hour strike of London Tube workers. The strike was scheduled to begin on Tuesday evening (21:

Striking Evidence from the London Underground Network
May 16, 2017 - We present evidence that a significant fraction of commuters on the London under- ground do not travel on their optimal route. We show that a strike on the underground, which forced many commuters to experiment with new routes, brought

Essential Discriminators for P2P Teletraffic ...
Characterization of P2P traffic is an essential step to develop workload models ... known protocols. To further reduce the costs on the collection, storage, and.

Cheap Bubm 3D Googles Shoulder Bag Profession Vr Case Digital ...
Cheap Bubm 3D Googles Shoulder Bag Profession Vr C ... aterproof Case Free Shipping & Wholesale Price.pdf. Cheap Bubm 3D Googles Shoulder Bag ...

Cheap Waterproof multi-functional Digital DSLR Camera Video Bag ...
Cheap Waterproof multi-functional Digital DSLR Came ... ll SLR Camera Laptop Bag for Photographer HU-04.pdf. Cheap Waterproof multi-functional Digital ...

Risk-based Selection in Unemployment Insurance: Evidence ... - LSE
Sep 4, 2017 - even when adverse selection is present, the government may do ... We first exploit Swedish employment protection regulation to isolate exogenous variation in .... This means that workers get divided into groups, defined by ...

CYBER CRIME & DIGITAL EVIDENCE - Detailed Tutorial.pdf
CYBER CRIME & DIGITAL EVIDENCE - Detailed Tutorial.pdf. CYBER CRIME & DIGITAL EVIDENCE - Detailed Tutorial.pdf. Open. Extract. Open with. Sign In.

Risk-based Selection in Unemployment Insurance: Evidence ... - LSE
Sep 4, 2017 - over the unemployment spell or over the business cyles. .... compare their unemployment risk to infra-marginal buyers of the same insurance plan. ...... affecting UI contracts used in the positive correlation test of Section 3.2.

CYBER CRIME & DIGITAL EVIDENCE - Detailed Tutorial.pdf ...
... Chief Police Officers has agreed to this revised. good practice guide being circulated to, and adopted by, Police Forces. in England, Wales & Northern Ireland.

P2P Whitepaper
Dec 6, 2000 - of the role of automated software agents in a peering infrastructure. ... phone a service technician can be alerted to a service call, obtain driving ...

JXTA_ Java P2P Programming
After you have selected OK, configuration files and directories will be written to disk and the platform will boot. Before the platform fully boots, you will be presented with a security login dialog that requests the name and password you chose in t

digital-forensics-for-network-internet-and-cloud-computing-a-forensic ...
... Infosecurity. Page 3 of 339. digital-forensics-for-network-internet-and-cloud-comp ... e-for-moving-targets-and-data.9781597495370.52476.pdf.

P2P Cache-and-Forward Mechanisms for Mobile Ad Hoc ... - Eurecom
minimizing the information access cost or the query delay. ... apply the two mobility models and develop the dissemination .... we implemented a simple application that allows nodes to ..... average and standard deviation of the χ2 index.

Query Containment under Bag and Bag-Set Semantics
D is a database instance of S. Q2 ⊑ Q1 .... Bag-set semantics: Set-valued database + Bag-operators .... Containment mapping from Q1 to Q2: Every distinct.